Vulnerability & Exploit Database

Displaying entries 1 - 10 of 19 in total

Results for: CVE-2014-2673 Back to search

ELSA-2015-0290 Important: Oracle Linux kernel security, bug fix, and enhancement update Vulnerability

  • Severity: 8
  • Published: September 28, 2014

The SMB2_tcon function in fs/cifs/smb2pdu.c in the Linux kernel before 3.16.3 allows remote CIFS servers to cause a denial of service (NULL pointer dereference and client system crash) or possibly have unspecified other impact by deleting the IPC$ share during resolution of DFS referrals.

RHSA-2014:1023: kernel security and bug fix update Vulnerability

  • Severity: 7
  • Published: August 01, 2014

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.Red Hat would like to thank Martin Schwidefsky of IBM for reportingCVE-2014-3534, Andy Lutomirski for reporting CVE-2014-0181, and Gopal ReddyKodudula of Nokia Siemens Networks for reporting CVE-2014-4667.This update also fixes the following bugs:All kern...

ELSA-2014-1023 Important: Oracle Linux kernel security and bug fix update Vulnerability

  • Severity: 7
  • Published: July 19, 2014

arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace ...

Cent OS: CVE-2014-2673: CESA-2014:1023 (kernel) Vulnerability

  • Severity: 5
  • Published: April 01, 2014

The arch_dup_task_struct function in the Transactional Memory (TM) implementation in arch/powerpc/kernel/process.c in the Linux kernel before 3.13.7 on the powerpc platform does not properly interact with the clone and fork system calls, which allows local users to cause a denial of service (Program Check and system crash) via certain in...

USN-2228-1: Linux kernel vulnerabilities Vulnerability

  • Severity: 10
  • Published: March 24, 2014

net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.

USN-2225-1: Linux kernel (Saucy HWE) vulnerabilities Vulnerability

  • Severity: 10
  • Published: March 24, 2014

net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.

SUSE Linux Security Vulnerability: CVE-2013-1992 Vulnerability

  • Severity: 7
  • Published: June 15, 2013

Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.

RHSA-2014:1436: X11 client libraries security, bug fix, and enhancement update Vulnerability

  • Severity: 8
  • Published: June 15, 2013

The X11 (Xorg) libraries provide library routines that are used within allX Window applications.Multiple integer overflow flaws, leading to heap-based buffer overflows,were found in the way various X11 client libraries handled certain protocoldata. An attacker able to submit invalid protocol data to an X11 server viaa malicious X11 clien...

USN-1546-1: libgc vulnerability Vulnerability

  • Severity: 5
  • Published: July 25, 2012

Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc funtions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, whi...